- [Narrator] Tapping into the data stream,…and what you will see,…will depend on the network architecture.…As we see in this complex graphic,…we can tap in in many areas of the network.…Wireless 802.11 acts like a hub,…which will allow you to see all of the traffic.…If tapping into a wired network,…you will most likely tap into a switch,…and you will see only your own traffic.…

In order to see traffic destined to a specific device,…network administrators use port mirroring, or SPAN,…which is switched port analysis.…For example, you can mirror the traffic going to a server…back to your laptop for analysis.…You can also use a full-duplex tap in line with traffic.…You will most likely need a special adapter.…There are various options to select…before beginning a capture,…including selecting the interface,…output choices, and capture options.…

When you're ready to tap in and capture for the first time,…you're going to go up to menu choices,…take a look at Capture, and then Options.…We'll begin with the Input tab.…On the Input tab, you'll see a list of your interfaces.…

Resume Transcript Auto-Scroll

Author

Released

1/30/2018

Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.